Amal authentication architectural model "3AM" : for secure information exchange
Dissertant
Thesis advisor
al-Umari, Husayn Yusuf
Qaddurah, Imad
Comitee Members
al-Jabir, Ahmad Awdah
al-Uqayli, Salih
al-Sarhan, Sami
University
Arab Academy for Financial and Banking Sciences
Faculty
The Faculty of Information Systems and Technology
University Country
Jordan
Degree
Ph.D.
Degree Date
2004
English Abstract
The key enabler to E-Government implementation is trust, and trust is built gradually between the communicating parties.
Trust was defined by different disciplines; the basis of employing trust in the cyberspace is the information technology security.
Existing trust model can benefit from additional security services to enable a more secure message exchange.
Currently, messages are not controlled; once sent it is impossible to revoke.
Therefore, this may cause un-secure working environment.
In addition, a communication exchange uses the same encryption technique for the duration of the session.
This gives higher probability for security vulnerabilities.
This work came to provide the suitable solution to E-Government implementations by enabling enhanced trust; via designing a new paradigm in authentication protocols, called Ama Authentication Architectural Model or 3AM.
The 3AM represents a new paradigm in the information security for many reasons, mainly, the 3AM allows message control mechanism after the message being sent, the 3AM authenticates messages as if it is a resource, the 3AM preserves message security and confidentiality by having message exchange directly between the sender and receiver without a third party, and the 3AM represents a new implementation of open crypto, the model is flexible, modular, could be used in many applications like E-Government, E-commerce, E-business mobile telephone systems, and other e-initiatives.
In addition, the 3AM overcomes cultural barriers of the E-government practices and provides mean of secure information exchange for all types of messages (i.e.
multi-media) in the working environment.
3AM modularity allows it be a plug and play model since it works with any existing security service.
Therefore, 3AM truly enhances the trust model by allowing the above benefits to any type of information exchange in cyberspace.
Main Subjects
Information Technology and Computer Science
Topics
- Knowledge management
- Technology
- Information technology
- Telematics
- Information resources
- Electronic information resources
No. of Pages
184
Table of Contents
Table of contents.
Abstract.
Chapter one : E-government as a catalyst in the information age.
Chapter two : Information technology security.
Chapter three : Authentication and identification.
Chapter four : E-government trust infrastructure.
Chapter five : Amal authentication architectural model (3AM).
Chapter six : Discussions and conclusions.
References.
American Psychological Association (APA)
Umari, Ahmad Husayn. (2004). Amal authentication architectural model "3AM" : for secure information exchange. (Doctoral dissertations Theses and Dissertations Master). Arab Academy for Financial and Banking Sciences, Jordan
https://search.emarefa.net/detail/BIM-304725
Modern Language Association (MLA)
Umari, Ahmad Husayn. Amal authentication architectural model "3AM" : for secure information exchange. (Doctoral dissertations Theses and Dissertations Master). Arab Academy for Financial and Banking Sciences. (2004).
https://search.emarefa.net/detail/BIM-304725
American Medical Association (AMA)
Umari, Ahmad Husayn. (2004). Amal authentication architectural model "3AM" : for secure information exchange. (Doctoral dissertations Theses and Dissertations Master). Arab Academy for Financial and Banking Sciences, Jordan
https://search.emarefa.net/detail/BIM-304725
Language
English
Data Type
Arab Theses
Record ID
BIM-304725